Which of the following terms
illustrates the security through obscurity concept? Code
obfuscation, Steganography, SSID broadcast suppression, Substitution
ciphers
Which of the answers listed below refers to a solution designed to strengthen the security of session keys? PFS
In cryptography, the term "Key stretching" refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks. True
Which of the three states of digital data requires data to be processed in an unencrypted form? Data-in-use
In cryptography, the term "Secret algorithm" refers to an algorithm designed in a way that prevents the examination of its inner workings. True
The term "Ephemeral key" refers to an asymmetric encryption key designed to be used only for the duration of a single session or transaction. True
What are the characteristics features of a session key? Used during a single session, Symmetric Key
In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length. The key size determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security. True
Unlike stream ciphers which process data by encrypting individual bits, block ciphers divide data into separate fragments and encrypt each fragment separately. True
Which of the following terms is used in conjunction with the assumption that the output of a cryptographic function should be considerably different from the corresponding plaintext input? Confusion
Which of the terms listed below is used to describe a situation where a small change introduced to the input data before encryption causes large changes in its encrypted version? Diffusion
Digital signatures provide: Integrity, Authentication, Non-repudiation
What are the examples of weak/deprecated cryptographic solutions? WEP, SSL, DES
What are the characteristic features of Elliptic Curve Cryptography (ECC)? Asymmetric encryption, Low processing power requirements, Suitable for small wireless devices
Examples of means that provide randomization during the encryption process include: Cryptographic nonce, Salting, Initialization Vector (IV)
Pseudo-random data used in combination with a secret key in WEP and SSL encryption schemes is known as: IV
Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks? Salt
Pseudo-random data added to a password before hashing is called: Salt
In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key. True
A type of encryption scheme that uses a paired public and private key is known as: Asymmetric encryption, Public-key encryption
Which of the block cipher modes listed below provides both data integrity and confidentiality? GCM
Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use? ECB
Symmetric encryption algorithms require large amounts of processing power for both encryption and decryption of data which makes them much slower in comparison to asymmetric encryption ciphers. False
A type of encryption scheme where the same key is used to encrypt and decrypt data is referred to as: Session-key encryption, Symmetric encryption, Secret-key encryption
Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption.) False
Which of the answers listed below refer to obfuscation methods? Steganography, XOR cipher, ROT13
What are the examples of key stretching algorithms? Bcrypt, PBKDF2
Which of the following are hashing algorithms? MD5, RIPEMD, HMAC, SHA
Which of the algorithms listed below does not fall into the category of asymmetric encryption? AES
Which of the following answers refers to a commonly used asymmetric algorithm for secure exchange of symmetric keys? Diffle-Hellman
A cryptographic standard for digital signatures is known as: DSA
Which of the algorithms listed below does not belong to the category of symmetric ciphers? RSA
Which of the answers listed below refer to the Advanced Encryption Standard (AES)? Symmetric-key algorithm, 128-, 192-, and 256-bit keys, and Block cipher algorithms
Which of the following cryptographic hash functions is the least vulnerable to attacks? SHA-512
Which of the cryptographic algorithms listed below is the least vulnerable to attacks? AES
Which of the following authentication protocols offer(s) countermeasures against replay attacks? Ipsec, Kerberos, CHAP
Which of the following answers lists an example of a cryptographic downgrade attack? POODLE
A situation where cryptographic hash function produces two different digests for the same input is referred to as hash collision. False
One of the measures for bypassing the failed logon attempt account lockout policy is to capture any relevant data that might contain the password and brute force it offline. True
An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is known as: Brute-force attack
Which password attack takes advantage of a predefined list of words? Dictionary attack
Rainbow tables are lookup tables used to speed up the process of password guessing. True
Which of the following answers refers to the contents of a rainbow table entry? Hash/Password
Which of the acronyms listed below refers to a cryptographic attack where the attacker has access to both the plaintext and its encrypted version? KPA
Which cryptographic attack relies on the concepts of probability theory? Birthday
Which of the answers listed below refers to a solution designed to strengthen the security of session keys? PFS
In cryptography, the term "Key stretching" refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks. True
Which of the three states of digital data requires data to be processed in an unencrypted form? Data-in-use
In cryptography, the term "Secret algorithm" refers to an algorithm designed in a way that prevents the examination of its inner workings. True
The term "Ephemeral key" refers to an asymmetric encryption key designed to be used only for the duration of a single session or transaction. True
What are the characteristics features of a session key? Used during a single session, Symmetric Key
In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length. The key size determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security. True
Unlike stream ciphers which process data by encrypting individual bits, block ciphers divide data into separate fragments and encrypt each fragment separately. True
Which of the following terms is used in conjunction with the assumption that the output of a cryptographic function should be considerably different from the corresponding plaintext input? Confusion
Which of the terms listed below is used to describe a situation where a small change introduced to the input data before encryption causes large changes in its encrypted version? Diffusion
Digital signatures provide: Integrity, Authentication, Non-repudiation
What are the examples of weak/deprecated cryptographic solutions? WEP, SSL, DES
What are the characteristic features of Elliptic Curve Cryptography (ECC)? Asymmetric encryption, Low processing power requirements, Suitable for small wireless devices
Examples of means that provide randomization during the encryption process include: Cryptographic nonce, Salting, Initialization Vector (IV)
Pseudo-random data used in combination with a secret key in WEP and SSL encryption schemes is known as: IV
Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks? Salt
Pseudo-random data added to a password before hashing is called: Salt
In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key. True
A type of encryption scheme that uses a paired public and private key is known as: Asymmetric encryption, Public-key encryption
Which of the block cipher modes listed below provides both data integrity and confidentiality? GCM
Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use? ECB
Symmetric encryption algorithms require large amounts of processing power for both encryption and decryption of data which makes them much slower in comparison to asymmetric encryption ciphers. False
A type of encryption scheme where the same key is used to encrypt and decrypt data is referred to as: Session-key encryption, Symmetric encryption, Secret-key encryption
Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption.) False
Which of the answers listed below refer to obfuscation methods? Steganography, XOR cipher, ROT13
What are the examples of key stretching algorithms? Bcrypt, PBKDF2
Which of the following are hashing algorithms? MD5, RIPEMD, HMAC, SHA
Which of the algorithms listed below does not fall into the category of asymmetric encryption? AES
Which of the following answers refers to a commonly used asymmetric algorithm for secure exchange of symmetric keys? Diffle-Hellman
A cryptographic standard for digital signatures is known as: DSA
Which of the algorithms listed below does not belong to the category of symmetric ciphers? RSA
Which of the answers listed below refer to the Advanced Encryption Standard (AES)? Symmetric-key algorithm, 128-, 192-, and 256-bit keys, and Block cipher algorithms
Which of the following cryptographic hash functions is the least vulnerable to attacks? SHA-512
Which of the cryptographic algorithms listed below is the least vulnerable to attacks? AES
Which of the following authentication protocols offer(s) countermeasures against replay attacks? Ipsec, Kerberos, CHAP
Which of the following answers lists an example of a cryptographic downgrade attack? POODLE
A situation where cryptographic hash function produces two different digests for the same input is referred to as hash collision. False
One of the measures for bypassing the failed logon attempt account lockout policy is to capture any relevant data that might contain the password and brute force it offline. True
An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is known as: Brute-force attack
Which password attack takes advantage of a predefined list of words? Dictionary attack
Rainbow tables are lookup tables used to speed up the process of password guessing. True
Which of the following answers refers to the contents of a rainbow table entry? Hash/Password
Which of the acronyms listed below refers to a cryptographic attack where the attacker has access to both the plaintext and its encrypted version? KPA
Which cryptographic attack relies on the concepts of probability theory? Birthday